logo

CVE-2019-19135 org.eclipse.milo:sdk-client

Package

Manager: maven
Name: org.eclipse.milo:sdk-client
Vulnerable Version: >=0 <=0.3.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00264 pctl0.49575

Details

Insufficient Nonce Validation in Eclipse Milo Client ### Impact Credential replay affecting those connected to a server when *all 3* of the following conditions are met: - `SecurityPolicy` is `None` - using username/password or X509-based authentication - the server has a defect causing it to send null/empty or zeroed nonces ### Patches The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`. ### Workarounds Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`. ### References https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues) * Email [the mailing list](mailto:milo-dev@eclipse.org)

Metadata

Created: 2020-03-16T22:46:50Z
Modified: 2021-07-28T18:54:53Z
Source: MANUAL
CWE IDs: ["CWE-330", "CWE-522"]
Alternative ID: GHSA-pq4w-qm9g-qx68
Finding: F035
Auto approve: 1